Zero-Knowledge Proof Vulnerability Analysis and Security Auditing.
Xueyan TangLingzhi ShiXun WangKyle CharbonnetShixiang TangShixiao SunPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- statistical databases
- access control
- malicious code detection
- inference control
- intrusion detection
- information security
- security issues
- security policies
- security systems
- computer security
- key management
- biometric data
- security analysis
- database
- security mechanisms
- security requirements
- data integrity
- security problems
- security threats
- network security
- security management
- security measures
- identity verification
- information systems
- social networks